You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/custom-detection-rules.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,7 +75,7 @@ In the Microsoft Defender portal, go to **Advanced hunting** and select an exist
75
75
76
76
77
77
To create a custom detection rule, the query must return the following columns:
78
-
1.`Timestamp` - This column is used to set the timestamp for generated alerts. The `Timestamp` that is returned from the query should not have been manipulated in the query and should be returned exactly as it appears in the raw event.
78
+
1.`Timestamp` - This column is used to set the timestamp for generated alerts. The `Timestamp` that is returned from the query shouldn't have been manipulated in the query and should be returned exactly as it appears in the raw event.
79
79
80
80
3. A column or combination of columns that uniquely identify the event in Defender XDR tables:
81
81
- For Microsoft Defender for Endpoint tables, the `Timestamp`, `DeviceId`, and `ReportId` columns must appear in the same event
@@ -109,7 +109,7 @@ There are various ways to ensure more complex queries return these columns. For
109
109
> [!IMPORTANT]
110
110
> Avoid filtering custom detections using the `Timestamp` column. The data used for custom detections is prefiltered based on the detection frequency.
111
111
112
-
The sample query below counts the number of unique devices (`DeviceId`) with antivirus detections and uses this count to find only the devices with more than five detections. To return the latest `Timestamp` and the corresponding `ReportId`, it uses the `summarize` operator with the `arg_max` function.
112
+
The following sample query counts the number of unique devices (`DeviceId`) with antivirus detections and uses this count to find only the devices with more than five detections. To return the latest `Timestamp` and the corresponding `ReportId`, it uses the `summarize` operator with the `arg_max` function.
113
113
114
114
```kusto
115
115
DeviceEvents
@@ -150,7 +150,7 @@ When you save a new rule, it runs and checks for matches from the past 30 days o
150
150
> [!TIP]
151
151
> Match the time filters in your query with the lookback period. Results outside of the lookback period are ignored.
152
152
153
-
When you edit a rule, the changes are applied in the next run time scheduled according to the frequency you set. The rule frequency is based on the event timestamp and not the ingestion time. There might also be small delays in specific runs, whereby the configured frequency is not 100% accurate.
153
+
When you edit a rule, the changes are applied in the next run time scheduled according to the frequency you set. The rule frequency is based on the event timestamp and not the ingestion time. There might also be small delays in specific runs, whereby the configured frequency isn't 100% accurate.
154
154
155
155
156
156
##### Continuous (NRT) frequency
@@ -166,7 +166,7 @@ Selecting **Migrate now** gives you a list of all compatible rules according to
166
166
167
167
:::image type="content" source="media/custom-detection-compatible-queries.png" alt-text="Screenshot of the continuous frequency compatible queries in advanced hunting." lightbox="media/custom-detection-compatible-queries.png":::
168
168
169
-
Once you click**Save**, the selected rules' frequency gets updated to Continuous (NRT) frequency.
169
+
Once you select**Save**, the selected rules' frequency gets updated to Continuous (NRT) frequency.
170
170
171
171
###### Queries you can run continuously
172
172
@@ -206,25 +206,25 @@ Near real-time detections are supported for the following tables:
206
206
> Only columns that are generally available can support **Continuous (NRT)** frequency.
207
207
208
208
###### Custom frequency for Microsoft Sentinel data (Preview)
209
-
Microsoft Sentinel customers that are onboarded to Microsoft Defender have the option to select Custom frequency when the rule is based only on data that is ingested to Microsoft Sentinel.
209
+
Microsoft Sentinel customers that are onboarded to Microsoft Defender can select **Custom** frequency when the rule is based only on data that is ingested to Microsoft Sentinel.
210
210
211
-
When you select this frequency option, the **Run query every input** component is displayed, where you type the desired frequency for the rule and use a dropdown to select the units: minutes, hours, or days. The supported range is any value from 5 minutes to 14 days. When selecting a frequency, the lookback period is determined automatically with the following logic:
212
-
1. For detections set to run more frequently than once a day, the lookback is 4 times the frequency. For example, if the frequency is 20 minutes, the lookback will be 20*4 = 80 minutes.
213
-
2. For detections set to run once a day or less frequently, the lookback is 30 days. For example, if set to run every 3 days, the lookback is 30 days
211
+
When you select this frequency option, the **Run query every input** component is displayed, where you type the desired frequency for the rule and use a dropdown to select the units: minutes, hours, or days. The supported range is any value from 5 minutes to 14 days. When you select a frequency, the lookback period is determined automatically with the following logic:
212
+
1. For detections set to run more frequently than once a day, the lookback is four times the frequency. For example, if the frequency is 20 minutes, the lookback will be 20*4 = 80 minutes.
213
+
2. For detections set to run once a day or less frequently, the lookback is 30 days. For example, if set to run every three days, the lookback is 30 days
214
214
215
215
> [!IMPORTANT]
216
216
>When selecting a custom frequency, we fetch your data from Microsoft Sentinel. This means that:
217
217
>1. You must have data available in Microsoft Sentinel
218
-
>2. Defender XDR data we will not support scoping, since Microsoft Sentinel does not support scoping
218
+
>2. Defender XDR data we won't support scoping, since Microsoft Sentinel doesn't support scoping
219
219
220
220
### 3. Define alert enrichment details
221
-
You can enrich alerts by providing and defining additional details, allowing you to:
221
+
You can enrich alerts by providing and defining more details, allowing you to:
222
222
-[Create a dynamic alert title and description](#create-a-dynamic-alert-title-and-description-preview)
-[Add custom details](#add-custom-details-preview) to display in the alert side panel
225
225
226
226
#### Create a dynamic alert title and description (Preview)
227
-
You can dynamically craft your alert’s title and description using the results of your query to make them accurate and indicative. This can boost SOC analysts’ efficiency when triaging alerts and incidents, and when trying to quickly understand the essence of an alert.
227
+
You can dynamically craft your alert’s title and description using the results of your query to make them accurate and indicative. This feature can boost SOC analysts’ efficiency when triaging alerts and incidents, and when trying to quickly understand the essence of an alert.
228
228
229
229
To dynamically configure the alert’s title or description, integrate them into the **Alert details** section by using the free text names of columns that are available in your query results and surrounding them with double curly brackets.
230
230
@@ -243,12 +243,12 @@ You can select only one column for each entity type (mailbox, user, or device).
243
243
244
244
##### Expanded entity mapping (Preview)
245
245
246
-
You can link a wide range of entity types to your alerts. Linking more entities helps our correlation engine group alerts to the same incidents and to correlate incidents together. If you are a Microsoft Sentinel customer, this also means that you can map any entity from your third-party data sources that are ingested into Microsoft Sentinel.
246
+
You can link a wide range of entity types to your alerts. Linking more entities helps our correlation engine group alerts to the same incidents and to correlate incidents together. If you're a Microsoft Sentinel customer, this also means that you can map any entity from your third-party data sources that are ingested into Microsoft Sentinel.
247
247
248
248
For Microsoft Defender XDR data, the entities are automatically selected. If the data is from Microsoft Sentinel, you need to select the entities manually.
249
249
250
250
>[!NOTE]
251
-
>Entities impact how alerts are grouped into incidents so make sure to carefully review the entities to ensure high incidents’ quality. Learn more about incidents correlation and alerts grouping
251
+
>Entities impact how alerts are grouped into incidents so make sure to carefully review the entities to ensure high incidents’ quality. Learn more about incidents correlation and alerts grouping.
252
252
253
253
There are two sections under the expanded **Entity mapping** section for which you can select entities:
254
254
-**Impacted assets** – Impacted assets that appear in the selected events should be added here. The following types of assets can be added:
@@ -259,7 +259,7 @@ There are two sections under the expanded **Entity mapping** section for which y
259
259
- Azure resource
260
260
- Amazon Web Services resource
261
261
- Google Cloud Platform resource
262
-
-**Related evidence** – Non-assets that appear in the selected events can be added in this section. The supported entity types are:
262
+
-**Related evidence** – Nonassets that appear in the selected events can be added in this section. The supported entity types are:
0 commit comments